Skip to main navigation Skip to search Skip to main content

An efficient trust evaluation approach in attacker dominated networks in internet of things

  • Wenmao Liu*
  • , Lihua Yin
  • , Binxing Fang
  • , Xiangzhan Yu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node's prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.

Original languageEnglish
Title of host publicationFuture Information Technology, Application, and Service, FutureTech 2012
Pages559-567
Number of pages9
EditionVOL. 1
DOIs
StatePublished - 2012
Externally publishedYes
Event7th FTRA International Conference on Future Information Technology, FutureTech 2012 - Vancouver, BC, Canada
Duration: 26 Jun 201228 Jun 2012

Publication series

NameLecture Notes in Electrical Engineering
NumberVOL. 1
Volume164 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference7th FTRA International Conference on Future Information Technology, FutureTech 2012
Country/TerritoryCanada
CityVancouver, BC
Period26/06/1228/06/12

Fingerprint

Dive into the research topics of 'An efficient trust evaluation approach in attacker dominated networks in internet of things'. Together they form a unique fingerprint.

Cite this